tag:blogger.com,1999:blog-6624072334698957794.post8529146049544768573..comments2022-04-08T05:14:47.823+02:00Comments on desc0n0cid0: Part 1 | Stack-based Buffer Overflow exploitation to shell by exampledesconocidohttp://www.blogger.com/profile/10917973280662485786noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-6624072334698957794.post-3946232577465301772016-11-22T20:54:41.953+01:002016-11-22T20:54:41.953+01:00Source code was only to show how such vulnerabilit...Source code was only to show how such vulnerability can look like, not in any means as a something to look at when writing your C code. I did mention that there is a mistake(just before the Exploit header), you need to read more carefully next time ;)desconocidohttps://www.blogger.com/profile/10917973280662485786noreply@blogger.comtag:blogger.com,1999:blog-6624072334698957794.post-46073476537949991332016-11-19T16:28:31.902+01:002016-11-19T16:28:31.902+01:00It depends on the python version you use, for pyth...It depends on the python version you use, for python2.7 it doesn't make any difference, in python3 you should do it the way you wrote it.desconocidohttps://www.blogger.com/profile/10917973280662485786noreply@blogger.comtag:blogger.com,1999:blog-6624072334698957794.post-5851616196520043312016-11-05T19:11:42.710+01:002016-11-05T19:11:42.710+01:00shouldn't there be:
f.write(b"A" * 1...shouldn't there be:<br />f.write(b"A" * 1032)<br />in payload generator for python not to complain about type errors?Anonymoushttps://www.blogger.com/profile/04054999302147106522noreply@blogger.com